Longer, more detailed, hands on, lasting half a day.
These have limited seating. These will fill up VERY quickly!
One Page All Workshops list with descriptions
defcon.org Workshops page
You may need to scroll to the right to see all info
64-bit Intel Assembly Language Programming for Hackers Workshop Info |
Accelerating Malware Analysis with WinDbg Time Travel Debugging Workshop Info |
Advanced Ghidra Scripting & Automation Workshop Info |
Analyzing and Creating Windows Shellcode for Hackers Workshop Info |
Cloud Forensics Workshop: Smart Grid Edition Workshop Info |
Contextualizing alerts with relevant logs and events without queries or LLMs Workshop Info |
Creating malicious functional app on Android Workshop Info |
Deep-dive into modern network fingerprinting Workshop Info |
Defeating Malware Evasion: Techniques and Countermeasures Workshop Info |
Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level Workshop Info |
Dive into Windows Library Loading Workshop Info |
DIY Malware Emulation: Build It, Break It, Detect It Workshop Info |
Effectively Detecting Modern Malware with Volatility 3 Workshop Info |
Eliminating Bug Classes at Scale: Leveraging Browser Features for Proactive Defense Workshop Info |
EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA. Workshop Info |
Fine Tune your personal LLM assistant to Secure coding Workshop Info |
Fortifying AI: Hands-On Training in Adversarial Attacks and Defense of AI Systems Workshop Info |
From Prompt to Protection: A Practical Guide to Building and Securing Generative AI Applications Workshop Info |
Hacker VPN Workshop Info |
Hacking the connected plant: AI edition! Workshop Info |
Hacking The Metal: Into the GPU Workshop Info |
Hands-on IoT firmware extraction and flash forensics Workshop Info |
Hands-on Kubernetes Attack & Defense Masterclass Workshop Info |
Hands-On Threat Hunting with Wireshark Workshop Info |
Inside the Threat: Designing and Deploying Malicious Browser Extensions to Understand Their Risk Workshop Info |
Introduction to Cryptographic Attacks Workshop Info |
K8sploitation: Hacking Kubernetes the Fun Way Workshop Info |
Learning to Hack Bluetooth Low Energy with BLE CTF Workshop Info |
Medical Device Hacking: 201 Workshop Info |
Obfuscation Reloaded: Modern Techniques for Evading Detection Workshop Info |
Open Source Malware 101 – Everything you always wanted to know about npm malware (and more) Workshop Info |
Pen-testing Cloud REST APIs Workshop Info |
PLC Playground: Hands-On Industrial Control Systems Attacks Workshop Info |
Practical YARA: Crafting Custom Rules for Targeted Malware Defense Workshop Info |
Provably exfiltrating data by breaking TLS in the right ways Workshop Info |
Putting EDRs in Their Place: Killing and Silencing EDR Agents Workshop Info |
Reach the Nirvana Workshop Info |
SnowGoat: Exposing Hidden Security Risks and Leaking Data Like a Threat Actor Workshop Info |
Whitebox Web Exploit Dev (WWED) Workshop Info |
Wi-Fi-So-Serious Workshop Info |